Venafi®, the leading provider of machine identity protection, today announced the Venafi Trust Protection Platform received Common Criteria Certification. Overseen by the National Information Assurance Partnership's (NIAP) Common Criteria Testing Laboratory (CCTL), Common Criteria Certification is a requirement for hardware and software devices to be used by Federal government and national security systems.

"This certification requires total company wide dedication to providing the highest levels of security, which is a mandatory market requirement in today's hostile cyber world," said Jeff Hudson, chief executive officer for Venafi. "Common Criteria has become a requirement for protecting a wide range of organizations, in government and in the private sector, because cyber criminals often use the same attacks across industries. The Venafi Trust Protection Platform is the only solution robust enough to secure the machine identities of the most classified government and military networks in the nation."

The Venafi Trust Protection Platform manages and secures the cryptographic keys and digital certificates that make up machine identities, delivering an enterprise-grade platform that provides in-depth security, operational efficiency and organizational compliance. Keys and certificates are used to uniquely identify and create trusted relationships between machines, devices and systems. They control the flow of information to trusted machines and prevent the flow of information to those that are not trusted.

With the Venafi Trust Protection Platform, government organizations can efficiently orchestrate the entire machine identity lifecycle, keeping communications between machines secure and private.

Currently twenty-six nations recognize the Common Criteria. In the United States, the NIAP -- a partnership between the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) -- is responsible for Common Criteria evaluation and implementation.

Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.